thumbnail Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability
thumbnail Effective Phishing Campaign Targeting European Companies and Organizations
thumbnail Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
thumbnail Jumpy Pisces Engages in Play Ransomware
thumbnail Chinese APT Abuses VSCode to Target Government in Asia
thumbnail Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant
thumbnail Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
thumbnail Leveraging DNS Tunneling for Tracking and Scanning
thumbnail Muddled Libra’s Evolution to the Cloud
thumbnail Ransomware Retrospective 2024: Unit 42 Leak Site Analysis
thumbnail Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
thumbnail Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
thumbnail Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
thumbnail Six Malicious Python Packages in the PyPI Targeting Windows Users
thumbnail Detecting Popular Cobalt Strike Malleable C2 Profile Techniques
thumbnail IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits
thumbnail Threat Actors Rapidly Adopt Web3 IPFS Technology
thumbnail Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
thumbnail GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
thumbnail Chinese PlugX Malware Hidden in Your USB Devices?
thumbnail Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats
thumbnail Meddler-in-the-Middle Phishing Attacks Explained MitM
thumbnail Vice Society: Profiling a Persistent Threat to the Education Sector
thumbnail Blowing Cobalt Strike Out of the Water With Memory Analysis
thumbnail Ransom Cartel Ransomware: A Possible Connection With REvil
thumbnail Credential Gathering From Third-Party Software
thumbnail Mirai Variant MooBot Targeting D-Link Devices
thumbnail Legitimate SaaS Platforms Being Used to Host Phishing Attacks
thumbnail There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families